Sat.Mar 02, 2019 - Fri.Mar 08, 2019

article thumbnail

Tech Titans Google And Microsoft Are Transforming Cybersecurity

Forrester IT

Last April, we outlined how the “Tech Titans” (Amazon, Google, and Microsoft) were poised to change the cybersecurity landscape by introducing a new model for enterprises to consume cyber security solutions. Security has long been delivered as siloed solutions located on-premise. These solutions were hard to buy, hard to use, and existed in siloes. Security […].

Google 382
article thumbnail

Artificial Intelligence Regulation May Be Impossible

CTOvision

Read why Michael Spencer says that artificial intelligence regulation is nearly impossible on Forbes : Artificial intelligence is a tool humanity is wielding with increasing recklessness. We say it’s for our common good with machine learning hype equal to business profits. But what happens when we don’t have the code of ethics, laws, government accountability, corporate transparency […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Active Directory PowerShell Module Configuration Baseline

Mick's IT Blog

With the recent 1809, RSAT is now integrated into Windows, which is a major plus for the admin side. In my environment, I have the active directory PowerShell module enabled on all machines for two reasons. The first is I use it to move the machine in AD during the build process. The second is that I have an SCCM baseline that makes sure the Bitlocker key matches the one stored in AD.

Windows 159
article thumbnail

List of Microsoft 365 Certification Exams and Cost Details

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. In this post, you will learn about the Microsoft 365 Certification exam in details. I have created a table to keep track of Microsoft certifications, exams, and training classes. I have a previous post which talks about latest SCCM certification (70-703). Intune device management certification is included in the Microsoft 365 certification path (you can […].

Microsoft 168
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Mobile World Congress Offers Food For Thought

Forrester IT

Food Tech figured prominently on the menu at Mobile World Congress 2019. Mobile operators, network equipment providers, device manufacturers and solution providers address challenges from farm, field, fishery or factory to fork, - and beyond. Venture investment has increased significantly. And, if Mobile World Congress is any indication, companies large and small are eager to get a place at the table.

Mobile 363
article thumbnail

Operationalizing AI

CTOvision

When AI practitioners talk about taking their machine learning models and deploying them into real-world environments, they don’t call it deployment. Instead the term that’s used in the industry is “operationalizing”. This might be confusing for traditional IT operations managers and applications developers. Why don’t we deploy or put into production AI models?

More Trending

article thumbnail

Incrementally Better

Eric D. Brown

Recently, I spent a week at the Grand Canyon National Park in Arizona. While visiting, I stayed in Tusayan Arizona, just a few miles outside the park’s entrance. When I visit places like this, I don’t have high expectations when it comes to dining. I’m not a food-a-phile (or whatever you call them) but I do like good food and I like to have a selection of choices, especially since I’ve recently been trying to eat cleaner in recent months.

Financial 130
article thumbnail

What CIOs Can Learn from Fleetwood Mac about Marketing

Forrester IT

Here at Forrester, we love all things music. Each office floor has a different musical theme and all the rooms are named after popular musicians of the time. It’s not uncommon to have a team meeting in Guns N’ Roses or an afternoon phone call in Jackson Browne. So, it seems natural to think of […].

Meeting 359
article thumbnail

The Value Of Ethics And Trust In Business. With Artificial Intelligence

CTOvision

Read why Stephen Ibaraki says that ethics and trust are very important issues while dealing with artificial intelligence on Forbes : The 128 most ethical companies for 2019 were announced this week from the Ethisphere Institute. The timing is fortuitous with the upcoming AI for Good, which I founded, global artificial intelligence dialogue including accountability, responsibility, […].

article thumbnail

How blockchain will manage networks

Network World

Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it's centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and packet management over to a smart contract, decentralized chain-based system.

Network 167
article thumbnail

2024 Salary Guide

Procom’s 2024 Salary Guide provides critical insights into the latest hiring trends, in-demand IT roles, and competitive pay rates across Canada and the U.S. It highlights key market dynamics such as the growing demand for remote work, skills-based hiring, and flexible staffing solutions. With detailed pay rate data for top IT positions like Cybersecurity Consultants, Cloud Engineers, and Salesforce Developers, this guide is an essential resource for companies looking to stay competitive in toda

article thumbnail

Local Administrator Baseline Compliance

Mick's IT Blog

One of the issues we have had is some users ending up being in the administrators group. There are circumstances to which we have to sometimes put a user in that group to install an application which is both user and computer-based. It can be easy to forget to take the user back out of that group. We don't allow the end users here to have local administrator privileges for security reasons.

Groups 154
article thumbnail

What To Expect At RSA Conference 2019: Cloud As Security Improvement And The Possible End Of The Infosec Gilded Age

Forrester IT

I recently did a webinar with a few of my colleagues from the RSA Conference Advisory Board on precisely this topic, which you can find here. We tried to expose as much as we could of the fantastic variety that you’ll find at RSA Conference 2019. Here’s a further elaboration of one of my favorite […].

article thumbnail

There Are Ways To Improve The Security of Your Artificial Intelligence Solutions

CTOvision

Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed […].

article thumbnail

SCCM Community Hub – Scripts Reports and Documentation

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. SCCM community Hub is the central location within your SCCM console where you can share useful SCCM objects with other admins. SCCM community hub is still in preview version. Note – There could be changes in production version of SCCM Community Hub What is SCCM Community Hub The Community Hub is a centralized location for […].

Report 160
article thumbnail

Guide to Centralizing IT Operations: How to Link Tasks and Tools with an Automation Platform

For many IT admins, business as usual is a juggling act. Job schedulers and scripts run on autopilot, applications and operating systems can’t speak the same language, and other tools—like RPA or MFT solutions—operate in isolation. On a good day, everything runs smoothly. But good days are rare; more often than not, something goes wrong and you’re stuck putting out fires.

article thumbnail

IT Talent Shortages: What Businesses are Doing to Cope

Information Week

For organizations that are having trouble recruiting IT professionals with in-demand skills, some options have become available in the cloud and gig economy.

Cloud 167
article thumbnail

Think Privacy’s Just A Cost Center? Think Again.

Forrester IT

Over and over, clients tell us they just don’t get enough funding for the kind of privacy programs they want to create. In fact, many privacy budgets shrank in 2019, after firms were forced to spend more than they expected on GDPR compliance in 2018. But what if we told you that customer-centric privacy programs […].

Budget 349
article thumbnail

NSA Makes Reverse Engineering Tool Freely Available

CTOvision

The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free. Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco. Ghidra, the NSA explains, is a software reverse […].

article thumbnail

Bitlocker Active Directory Recovery Password Backup Compliance

Mick's IT Blog

Recently, we had an issue of some machines not backing up the Bitlocker recovery password to active directory, even with the GPO in place. They ended up being offline while the bitlocker process took place. Plus, some of the systems in AD had multiple entries, which can be cumbersome. To mitigate this issue, I have implemented an SCCM Configuration Baseline that makes sure the Bitlocker recovery password is backed up to AD and that it is the only recovery password present.

Backup 144
article thumbnail

HR Meets AI: The New Way of Keeping Large Workforces Connected and Engaged

Speaker: Miriam Connaughton and Donald Knight

As organizations scale, keeping employees connected, engaged, and productive can seem like a monumental task. But what if AI could help you do all of this and more? AI has the power to help, but the key is implementing it in a way that enhances, rather than replaces, human connection. Join us for an exploration into how industry trailblazers are using AI to transform employee experience at scale while addressing both the potential and the pitfalls.

article thumbnail

Cisco uncorks 26 security patches for switches, firewalls

Network World

Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages. [ Also see What to consider when deploying a next generation firewall. | Get regularly scheduled insights by signing up for Network World newsletters. ].

Firewall 165
article thumbnail

We Should Chat About WeChat And Why Facebook Wants In

Forrester IT

For years, I’ve maintained that Mark Zuckerberg, CEO of Facebook Inc., has had his eye on a singular goal: becoming the global version of China’s WeChat. WeChat is China’s most popular messaging app with 1 billion monthly users. China’s population is 1.4 billion people, which means approximately 2 in 3 Chinese are on WeChat. But WeChat […].

article thumbnail

W3C approves WebAuthn as the web standard for password-free logins

CTOvision

The World Wide Web Consortium (W3C) today declared that the Web Authentication API (WebAuthn) is now an official web standard. First announced by the W3C and the FIDO Alliance in February 2016, WebAuthn is now an open standard for password-free logins on the web. It is supported by W3C contributors, including Airbnb, Alibaba, Apple, Google, […].

article thumbnail

Incrementally Better

Eric D. Brown

Recently, I spent a week at the Grand Canyon National Park in Arizona. While visiting, I stayed in Tusayan Arizona, just a few miles outside the park’s entrance. When I visit places like this, I don’t have high expectations when it comes to dining. I’m not a food-a-phile (or whatever you call them) but I do like good food and I like to have a selection of choices, especially since I’ve recently been trying to eat cleaner in recent months.

Financial 113
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

8 Best Employee Engagement Strategies

Kitaboo

Are your employees really engaged at your workplace? According to a survey, only 34% of workers in the U.S. are engaged. The rest of them are probably just clocking in the hours and looking for a better job. What is the reason behind this lack of engagement? Is it work pressure? Do they feel unacknowledged? Don’t they like the work environment? A disengaged workforce, however talented, does more harm than good for your organization, as they tend to be less productive and hardly enthusiastic abo

Strategy 116
article thumbnail

Uncovering 2020 Digital Experience Priorities: It’s That (survey) Time of Year!

Forrester IT

This week we launched our annual panel survey on Digital Experience (DX) priorities, challenges and strategies. If you’re a leader, decision-maker, or influencer of your enterprise DX strategy, we’d love to have your input: [link] take the survey?

Survey 342
article thumbnail

Regarding Facebook’s cryptocurrency

CTOvision

If Bloomberg and the New York Times are to be believed, later this year Facebook will introduce a cryptocurrency which will allow WhatsApp users to send money instantly. Yes, that’s right: Facebook. Cryptocurrency. Earthquake! Revolution! The world is tilting on its axis! The end times are cometh! Except – um – what exactly are people going […].

CTO 213
article thumbnail

Cryptocurrency miners exploit Docker flaw

Network World

According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker's remote API has already been taken advantage of by hundreds of attackers. Imperva claims that they were able to locate 3,822 Docker hosts with the remote API (port 2735) publicly exposed. Of these, approximately 400 were accessible, and most of these were running a cryptocurrency miner for a lesser-known form of cryptocurrency called Monero. [ Two-Minute Linux Tips: Learn how to master a host of Linux

Linux 144
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

CIOs Are Racing To Deal With The Next Big Security Threat

The Accidental Successful CIO

Quantum computing may allow unstoppable future attacks on corporate networks Image Credit: Brookhaven National Laboratory. One of the most important jobs that the person with the CIO job has is to keep the company’s networks and data secure because of the importance of information technology. This means that they are responsible for implementing systems and procedures that will keep the bad guys out.

Security 100
article thumbnail

Data And Analytics Leaders, We Need You!

Forrester IT

How do you create an insights-driven organization? One way is leadership. And we’d like to hear about yours. Today, half of the respondents in Forrester’s Business Technographics® survey data report that their organizations have a chief data officer (CDO). A similar number report having a chief analytics officer (CAO). Many firms without these insights leaders […].

Data 337
article thumbnail

IoT Future-Proofing for the Long Haul

CTOvision

Read Don Dingee’s article about how to future-proof Internet of Things connected devices on Dev Ops : Think about this: The IoT application your DevOps team is developing right now, if successful at scale, will likely be the longest-living application in your shop. It may even outlive the tenure of many of your team members […].

Devops 197
article thumbnail

10 Steps to Develop Applications with Embedded Analytics

Social, Agile and Transformation

Designing and developing data-driven applications has to go through a modified agile planning, discovery, and user experience design compared to traditional applications. Why? Because the data is an input to the design and development process! In other words, designers of the user experience cannot do their work in a bubble. They have to review the underlying data, work with customers to.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.